Galal A. Al-Rummana et al., International Journal of Advanced Trends in Computer Science and Engineering, 10(3), May - June 2021, 1776 – 1783 1776 ABSTRACT In the present study, an algorithm for big data encryption has been designed which is concerned with encrypting data in a short time and in a safe manner and difficult to be penetrated by attackers and hackers according to the mechanism used for encryption in this study. The proposed algorithm is a development of an earlier NSCT algorithm. This development is based on adding a key expansion mechanism to generate keys by F-function, and also the number of cycles have been reduced to get less time. The proposed algorithm has been implemented in three stages; the first stage is implemented by FELICS simulation to find out the efficiency of the algorithm. In the second stage the proposed algorithm is implemented on the Java language to encrypt the text and to find out the execution time for the encryption. In the last step, the proposed algorithm is implemented on the MATLAB language to encrypt images and to know the performance of the algorithm in terms of countering attacks by hackers. After performing these steps and obtaining the results presented in this study, we can say that the proposed algorithm is capable of dealing with big data and that it can be considered safe and free from risks. Key words: Big Data, Big Data Security, Big Data Encryption, Cryptography, key Generation. 1. INTRODUCTION From day to another, information technology is moving at a fast pace towards a very great horizon. The data is increasing tremendously due to the massive use of modern technology that has become present in every part of the world to manage the affairs of people, organizations and governments and facilitate their work. This tremendous acceleration imposes the existence of huge data that are difficult to quantify, for instance, at the home level a large amount of data is generated, so how is the situation at a larger level for companies, institutions and governments. Taking all these in consideration, serious questions should be raised; How can we protect this data safely? , Are the traditional protection systems in place now capable of protecting in the same manner as they were previously? And Are there no other ways to deal with, analyze and store these data more accurately? By observing the data, we find that their increase is not limited to an individual level, as we note that there are many areas for data that include science, medicine and other different fields, and this does not include structured data only, but exceeds them to unstructured data and semi-structured data. When describing these data, the matter is focused on their quantitative size, we can say that they are (terabyte) or (beta byte), and because they are of this enormous size, it is certain that they carry sensitive data, which makes the possibility of data corruption a source of concern and fear for the user. However, it becomes more serious when data corruption happened in government or private institutions. So, it must be protected by strong systems that keep them safe from any attack and damage, and we can also say that volume, variety and velocity are among the most important characteristics of big data [1]. Therefore, in this study, we will talk about solutions that are summarized in improving one of the data encryption techniques used to encrypt big data. This can be done through making a small change in the structure of the previous algorithm, in terms of the key and the number of cycles, as well as a comparison of the new algorithm with some existing algorithms for encrypting big data. This will improve work efficiency and reduce execution time by reducing the number of cycles. Aim of the study The aim of this study is to compare the performance and security of the encryption system in the New Stream Cipher Technique for Data Encryption (NSCT), Blowfish, Novel-Blowfish, and the proposed algorithm. The study also aims to calculate the execution time taken in encryption and which one is more appropriate for big data. 2. LITERATURE REVIEW Generally, the science of cryptography is the study of concealing information and the permission of protection of information from other third parties when communication occurs through an unreliable medium such as the internet. This science has two encryption keys: the public encryption key and the private encryption key. Faster Big Data Encryption Technique Using Key Generation Galal A. Al-Rummana 1 , Abdulrazzaq H. A. Al-Ahdal 2 , G. N. Shinde 3 1 School of Computational Sciences, S.R.T.M. University, India,Galal300z@gmail.com 2 School of Computational Sciences, S.R.T.M. University, India,alahdal201211@gmail.com 3 Yeshwant College, Former Pro-Vice Chancellor, S.R.T.M. University, India, shindegn@yahoo.co.in ISSN 2278-3091 Volume 10, No.3, May - June 2021 International Journal of Advanced Trends in Computer Science and Engineering Available Online at http://www.warse.org/IJATCSE/static/pdf/file/ijatcse411032021.pdf https://doi.org/10.30534/ijatcse/2021/411032021